libseccomp 2.3.1-2.1ubuntu4 source package in Ubuntu

Changelog

libseccomp (2.3.1-2.1ubuntu4) bionic; urgency=medium

  * debian/tests/data/open.fail_filter: The libseccomp autopkgtests were
    failing with glibc 2.27 due to changes in glibc which resulted in
    openat() exclusively being used, without any calls to open(). This
    resulted in the test process exiting normally instead of being
    killed, as was expected. Fix the test failure by removing openat()
    from the list of whitelisted syscalls so that the process is killed.

 -- Tyler Hicks <email address hidden>  Thu, 01 Mar 2018 18:09:19 +0000

Upload details

Uploaded by:
Tyler Hicks
Uploaded to:
Bionic
Original maintainer:
Ubuntu Developers
Architectures:
linux-any
Section:
libs
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Bionic release main libs

Downloads

File Size SHA-256 Checksum
libseccomp_2.3.1.orig.tar.gz 539.4 KiB ff5bdd2168790f1979e24eaa498f8606c2f2d96f08a8dc4006a2e88affa4562b
libseccomp_2.3.1-2.1ubuntu4.debian.tar.xz 17.1 KiB 1acba6ca57b66015a876fbb342b1a1a22721c410fa1c597b08498369edc607f5
libseccomp_2.3.1-2.1ubuntu4.dsc 2.2 KiB ad6ca3804ad758a00401f11d1a0a6a2e1da132bfcd47b58a60d0c83929271d96

View changes file

Binary packages built by this source

libseccomp-dev: high level interface to Linux seccomp filter (development files)

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.
 .
 This package contains the development files.

libseccomp2: high level interface to Linux seccomp filter

 This library provides a high level interface to constructing, analyzing
 and installing seccomp filters via a BPF passed to the Linux Kernel's
 prctl() syscall.

libseccomp2-dbgsym: debug symbols for libseccomp2
seccomp: helper tools for high level interface to Linux seccomp filter

 Provides helper tools for interacting with libseccomp. Currently, only
 a single tool exists, providing a way to easily enumerate syscalls across
 the supported architectures.

seccomp-dbgsym: debug symbols for seccomp